First published: Tue Apr 14 2009(Updated: )
Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Access Manager | =3-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6722 is considered a medium-severity vulnerability due to the potential for session hijacking.
To fix CVE-2008-6722, upgrade to a later version of Novell Access Manager that properly handles session expiration.
CVE-2008-6722 enables attackers to perform session hijacking by using a valid SSL sessionID.
CVE-2008-6722 affects Novell Access Manager 3 SP4.
CVE-2008-6722 negatively impacts user sessions by allowing unauthorized access through unexpired SSL sessionIDs.